-
2
-
-
27644488112
-
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
-
Chan, H., Gligor, V.D., Perrig, A., Muralidharan, G.: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Transactions on Dependable and Secure Computing 2(3), 233–247 (2005)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
3
-
-
84884723585
-
Novel Distributed Key Revocation Scheme for Wireless Sensor Networks
-
Chao, C.H., Yang, C.F., Lin, P.T., Li, J.S.: Novel Distributed Key Revocation Scheme for Wireless Sensor Networks. Security and Communication Networks 6(10), 1271–1280 (2013)
-
(2013)
Security and Communication Networks
, vol.6
, Issue.10
, pp. 1271-1280
-
-
Chao, C.H.1
Yang, C.F.2
Lin, P.T.3
Li, J.S.4
-
5
-
-
33747171940
-
The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols
-
Choo, K.K.R., Boyd, C., Hitchcock, Y.: The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols. Computer Communications 29(15), 2788–2797 (2006)
-
(2006)
Computer Communications
, vol.29
, Issue.15
, pp. 2788-2797
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
-
6
-
-
49749124613
-
A key Pre-distribution Scheme for Wireless Sensor Networks Using Hexagonal Deployment Knowledge
-
Jiang, Y., Shi, H.: A key Pre-distribution Scheme for Wireless Sensor Networks Using Hexagonal Deployment Knowledge. Chinese Journal of Electronics 17(3), 520–525 (2008)
-
(2008)
Chinese Journal of Electronics
, vol.17
, Issue.3
, pp. 520-525
-
-
Jiang, Y.1
Shi, H.2
-
7
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
8
-
-
85000276942
-
Multi-level μTESLA: Broadcast authentication for distributed sensor networks
-
Liu, D., Ning, P.: Multi-level μTESLA: Broadcast authentication for distributed sensor networks. Trans. on Embedded Computing Sys. 3(4), 800–836 (2004)
-
(2004)
Trans. on Embedded Computing Sys
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
11
-
-
38549152403
-
KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks
-
Wang, Y., Ramamurthy, B., Zou, X.: KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks. In: International Conference on Communications, pp. 1260–1265 (2007)
-
(2007)
International Conference on Communications
, pp. 1260-1265
-
-
Wang, Y.1
Ramamurthy, B.2
Zou, X.3
-
12
-
-
77954438261
-
DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor Networks
-
Park, C.H., Zhang, Y.Y., Kim, I.T., Park, M.S.: DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor Networks. In: 2010 International Conference Information Science and Applications (ICISA), pp. 1–8 (2010)
-
(2010)
2010 International Conference Information Science and Applications (ICISA
, pp. 1-8
-
-
Park, C.H.1
Zhang, Y.Y.2
Kim, I.T.3
Park, M.S.4
-
13
-
-
67650672499
-
Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks
-
Zeng, P., Cao, Z., Choo, K.K.R., Wang, S.: Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks. IEEE Communications Letters 13(6), 426–428 (2009)
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.6
, pp. 426-428
-
-
Zeng, P.1
Cao, Z.2
Choo, K.K.R.3
Wang, S.4
-
14
-
-
77954732460
-
On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks
-
Zeng, P., Cao, Z., Choo, K.K.R., Sun, D.: On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks. IEEE Transactions on Consumer Electronics 56(2), 566–569 (2010)
-
(2010)
IEEE Transactions on Consumer Electronics
, vol.56
, Issue.2
, pp. 566-569
-
-
Zeng, P.1
Cao, Z.2
Choo, K.K.R.3
Sun, D.4
-
15
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (2013)
-
(2013)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
16
-
-
85083941157
-
A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks
-
Jiang, Y., Zhang, R.N., Du, X.J.: A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks. In: 14th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2013 (2013)
-
(2013)
14th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2013
-
-
Jiang, Y.1
Zhang, R.N.2
Du, X.J.3
-
18
-
-
84884730529
-
An optimal Class of Symmetric Key Generation Systems
-
In: Beth, T., Cot, N., Ingemarsson, I. (eds.), Springer, Heidelberg
-
Blom, R.: An optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
-
(1985)
EUROCRYPT 1984. LNCS
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
19
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis and Defenses
-
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis and Defenses. In: Third International Workshop on Information Processing in Sensor Networks, IPSN (2004)
-
(2004)
Third International Workshop on Information Processing in Sensor Networks, IPSN
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
20
-
-
33748989560
-
Key Management for Mobile Sensor Networks
-
In: Burmester, M., Yasinsac, A. (eds.), Springer, Heidelberg
-
Sánchez, D.S., Baldus, H.: Key Management for Mobile Sensor Networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 14–26. Springer, Heidelberg (2006)
-
(2006)
MADNES 2005. LNCS
, vol.4074
, pp. 14-26
-
-
Sánchez, D.S.1
Baldus, H.2
-
21
-
-
36249010323
-
Secure Path-Key Revocation for Symmetric Key Predistribution Schemes in Sensor Networks
-
In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.), Springer, Boston
-
Moore, T., Clulow, J.: Secure Path-Key Revocation for Symmetric Key Predistribution Schemes in Sensor Networks. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 157–168. Springer, Boston (2007)
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments. IFIP
, vol.232
, pp. 157-168
-
-
Moore, T.1
Clulow, J.2
|